News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Email encryption in the cloud
Email encryption in the cloud

Five challenges with e-mail encryption in the cloud: If e-mails are unencrypted on the server, all information can be copied and read by attackers. Software as a Service (SaaS) makes life easier for companies in many ways: The providers not only ensure that sufficient computing power is available. You also import updates and patches for applications such as Office or e-mail services and thus close security gaps quickly. Especially after the critical weak points in Microsoft Exchange Server at the beginning of March, this aspect increases the attractiveness of Microsoft 365 (M365) as a SaaS solution. However, companies may ...

Read more

GreenShield for VS-NfD-compliant email and file encryption
B2B Cyber ​​Security ShortNews

Authorities can now access it from the Federal Department Store: GreenShield software for VS-NfD-compliant email and file encryption. With immediate effect, federal authorities and institutions can obtain the GreenShield e-mail security software directly and easily from the German Federal Department Store (KdB). Cv cryptovision GmbH has concluded a framework agreement for the federal administration with the procurement office of the Federal Ministry of the Interior about the BSI-approved GreenShield software. As part of the contract, necessary services for implementation, operation and support can also be ordered from the KdB. Compliant VS-NfD email and file encryption GreenShield protects emails and files on the basis of end-to-end encryption and ...

Read more

BSI publishes VeraCrypt security analysis
B2B Cyber ​​Security ShortNews

On behalf of the Federal Office for Information Security (BSI), the Fraunhofer Institute for Secure Information Technology SIT examined the security of the VeraCrypt encryption software. VeraCrypt is open source encryption software for Windows, Linux and macOS. The software enables the encryption of an entire hard drive and the creation of encrypted containers. VeraCrypt is the successor to the well-known encryption software TrueCrypt, the development of which was unexpectedly discontinued in 2014. VeraCrypt: No Vulnerabilities Identified The VeraCrypt investigation did not identify any serious vulnerabilities. However, in several areas (e.g. in the development process and on the subject of code quality) there was potential for improvement ...

Read more

Forensics: Keys for virtual machines

Elcomsoft opens encrypted virtual machines for law enforcement forensic experts. The new version 4.30 of the Elcomsoft Distributed Password Recovery product supports access to additional encrypted virtual machines. As a result, forensic researchers now have access to data stored in encrypted VMware, Parallels and VirtualBox virtual machines. Additionally, a new rules editor has been added to the UI, allowing users to edit hybrid attack rules directly in the UI. "Virtual machines are very common in the criminal world," explains Andy Malyshev, CEO of ElcomSoft. “By using an encrypted virtual machine, criminals can…

Read more

Study: hardly any encrypted emails
B2B Cyber ​​Security ShortNews

The new REDDOXX study confirms the status of e-mail: only one in eight uses encrypted e-mails. 93% of the respondents definitely do not see an obsolete model in the e-mail. Email remains an important communication medium. Spam is still a problem. And e-mail encryption is certainly considered to be sensible - but there is no lack of reasons for not encrypting it after all. These are some of the central results of a new study by REDDOXX on the “Status of e-mail in Germany”, in which 1.087 full-time employees were surveyed. Use of e-mail, especially for professional purposes E-mail is obsolete? See that ...

Read more

USB mass storage device security risk
Office PC USB stick

USB mass storage devices provide a quick, easy way to move and share data when digital transmission is not possible. However, the high risk of theft and loss makes USB mass storage devices a security nightmare for corporate security. The current widespread remote work has exacerbated these problems. The volume of data downloaded by employees to USB mass storage devices has increased by 19 percent since the beginning of the COVID-123 crisis, according to the DG Data Trends Report. This suggests that many employees are using these devices to take large amounts of data home with them. As a result, there are ...

Read more